Longtime computer security rivals are joining forces to battle increasingly sophisticated online attacks by cyber criminals.
“The attacks are getting more complex, and if we want to get ahead of attackers the call is to work together in a community approach,” Microsoft Security Response Center director Mike Reavey said.
“One of the things becoming clear is that customers want vendors to work together, and they want information and protection out faster,” he said.
Microsoft used a premier Black Hat security conference taking place this week in Las Vegas as a stage to unveil enhancements to the software giant’s computer defense collaboration efforts.
Microsoft released a new tool designed to make it easier for software security firms to model hacker threats and craft defenses.
The Redmond, Washington-based technology firm also unveiled a guidebook to demystify the realm of software security updates and vulnerability patches.
“There is a sea of information out there and we want to help customers navigate those waters,” Reavey said. “The guide walks them through what we do.”
A Microsoft Active Protections Program launched at Black Hat last year has grown to 47 members that share information to minimize time hackers have to craft and launch attacks on newly discovered software weaknesses, Reavey said.
“By working together, the security vendors get free vulnerability information, Microsoft knows their products will be protected from widespread exploitation when the disclosure goes out, and customers win by remaining protected,” TippingPoint security researcher Jason Avery said in a release.
“Everyone wins,” he said.
Microsoft provides computer security allies with an “exploitability index” that gauges the likelihood hackers will target various vulnerabilities to help security companies prioritize responses.
Microsoft also shares lessons learned while analyzing software for flaws.
“What we are seeing is they are working well with us and we are working well together,” Reavey said of allies in the software security world.
Security industry teamwork was crucial in countering a Conficker virus that plagued the Internet early this year.
Microsoft rallied a task force to stamp out Conficker, also referred to as DownAdUp, and the software colossus has placed a bounty of US$250,000 on the heads of those responsible for the threat.
The worm, a self-replicating program, takes advantage of networks or computers that haven’t kept up to date with security patches for Windows.
It can infect machines from the Internet or by hiding on USB memory sticks carrying data from one computer to another.
Conficker could be triggered to steal data or turn control of infected computers over to hackers amassing “zombie” machines into “botnet” armies.
Tools to remove Conficker virus and prevent its spread have been released, but computers without properly updated software could still be vulnerable.
SECRET OUT: Minister of Health and Welfare Chen Shih-chung yesterday accidentally revealed that the infections occurred at the ministry’s Taoyuan General Hospital The Central Epidemic Command Center (CECC) yesterday reported the fifth COVID-19 case in a cluster infection at a Taoyuan hospital, where four other medical workers were confirmed to have been infected over the past week. The latest case is a nurse who had tested negative on Tuesday last week, Minister of Health and Welfare Chen Shih-chung (陳時中), who heads the CECC, told a news conference. However, on Thursday, she developed symptoms, such as nasal congestion and a cough, and a second test yesterday found that she was infected, Chen said. She is the head nurse of a ward where two
VIGILANCE: While two of the cases are family members of a nurse, there is no sign of community spread and the source of infection is identifiable, the CECC said The Central Epidemic Command Center (CECC) yesterday reported four new domestic COVID-19 cases associated with a cluster infection at a Taoyuan hospital. Since the first case was identified on Tuesday last week, five healthcare workers — two doctors and three nurses — at the Ministry of Health and Welfare’s Taoyuan General Hospital have tested positive for the virus. Minister of Health and Welfare Chen Shih-chung (陳時中), who heads the center, said that two of the four new cases are the husband and daughter of a nurse (case No. 863) who had earlier been confirmed to have COVID-19. The husband (case No. 864)
Don Quijote, the biggest discount store in Japan, is opening its first store in Taiwan today. The three-story Don Don Donki store in Taipei’s Ximending (西門町) area, which operates 24 hours a day, has already created 400 jobs, the Ministry of Economic Affairs (MOEA) said in a press release. Many Taiwanese, including Taipei Deputy Mayor Vivian Huang (黃珊珊), consider a trip to Don Quijote an essential stop in Japan. “I have been to Don Quijote at least 10 times myself,” Huang said yesterday at a news conference announcing the store’s opening. “They are rendering an important service, because we cannot travel
‘CONTAINED’: The CECC is not considering locking down the hospital where the infections were detected, as their source has been found, Chen Shih-chung said The Central Epidemic Command Center (CECC) yesterday reported one new domestic COVID-19 case, a doctor at a hospital in northern Taiwan where three other medical workers were confirmed to have the disease over the past week. The new case — No. 856 — is a doctor who had treated a COVID-19 patient together with case No. 838, said Minister of Health and Welfare Chen Shih-chung (陳時中), who heads the center. Case No. 838, confirmed as a locally infected COVID-19 case on Tuesday, was the first case in the hospital cluster, and later infected his partner, who is a nurse at the same